- Related Products
- AD360
- Log360
- ADAudit Plus
- ADSelfService Plus
- EventLog Analyzer
- Exchange Reporter Plus
Risk Exposure Management in ADManager Plus provides a centralized, visual representation of accounts with access to sensitive and high-privilege entities within your Active Directory (AD).
By monitoring over-permissioned identities and evaluating potential threat paths, ADManager Plus helps display your organization’s exposure to internal and external attacks. It equips you with detailed insights into why an entity is considered exposed and what can be done to mitigate the associated risks.
With this capability, ADManager Plus helps you understand the scope of privilege exposure, evaluate the risk it poses, and implement effective remediation measures—strengthening your IT environment’s security and resilience.
In this document, you will learn the following:
Here are some terms that are important to understand:
| Term | Description |
|---|---|
| Privileged Entity | Active Directory groups with elevated permissions that provide access to sensitive resources. |
| Privileged Entity Exposure | Security risks that arise from excessive or misconfigured privileges on critical entities. |
| Attack Path | A continuous flow of connected entities representing a potential route an attacker can take to compromise the target. |
| Accounts in Attack Path | Accounts traversed by the attacker to move laterally toward the target. |
| Attack Flow | Sequential path showing how the attacker progresses through the environment. |
| Parent | Preceding object in the attack path that enables access to the next entity. |
| Relation | Type of privilege or trust that connects two objects in the attack path. |
Note: By default, built-in AD groups are listed as privileged entities in ADManager Plus. To add other groups as a privileged entity, click here.
The attack flow graph visualizes how privileges and permissions flow across users, groups, computers, and AD objects in your environment. It helps identify potential attack paths that could lead to privilege escalation or domain compromise.
Each connection between nodes represents a specific permission or relation that governs how one object can influence or control another. If these relations are misconfigured or overly permissive, they might be exploited during an attack to move laterally or escalate privileges.
During a routine security review, administrators discovered that sensitive sales and financial data had been accessed using Sales Managers group privileges. However, the user involved—Daniel—was not listed as a member of any high-privilege group, and there was no direct evidence linking him to the Sales Managers group.

Using ADManager Plus' Risk Exposure Management, the team visualized hidden privilege paths.
The hidden chain of group memberships and delegated permissions created an unnoticed privilege escalation path, allowing Daniel or anyone with access to his account to gain domain-level control. By leveraging Risk Exposure Management, the administrators were able to trace and eliminate these indirect attack paths proactively, mitigating the risk before any damage occurred.
The legend pop-up helps administrators understand the attack flow by explaining node types, object categories by color, and the meaning of relations.
Object types
| Symbol | Object Type |
|---|---|
| User | |
| Group | |
| Computer | |
| Other AD Objects |
Node types
| Symbol | Node Type | Description |
|---|---|---|
| Target | High-value target object that could be a potential goal of an attacker. | |
| Entry Point | Initial object from where the attack path begins. | |
| Cluster | A group of related nodes, collapsed to reduce visual clutter. |
Relation types
| Symbol | Relation Type | Description |
|---|---|---|
| MemberOf | Represents group membership, indicating that the object is a member of another group. | |
| Owns | Represents ownership of one object over another object. | |
| Other Permissions | Other delegated permissions, such as Write, Read, or Special control rights. |
The attack flow visualizes the following relation types, each representing a potential privilege flow or attack path that could be leveraged within the AD environment.
Risk Exposure Query provides a comprehensive set of predefined queries designed to identify common security exposures and permission risks within your AD environment. Each query result includes a visual representation of objects and their relations, enabling administrators to understand and address privilege-related risks.
These relations illustrate how privileges are linked or inherited across users, groups, and other AD entities, including nested memberships and trust paths. By mapping these connections, ADManager Plus helps identify potential exploitation paths that attackers could use for privilege escalation or lateral movement. Each query is also accompanied by actionable remediation measures that guide administrators on the necessary actions to be taken to mitigate risks and strengthen the overall AD security posture.
Identify all members of the Domain Admins group, including those in nested groups, to Gain complete visibility into who has top-tier privileges in your domain.
Identify and analyze all domain trust relationships within the forest and understand how domains trust each other and evaluate potential cross-domain attack surfaces.
Identify privileged group members vulnerable to Kerberoasting attacks and mitigate risk by pinpointing accounts that expose high-value targets.
Trace attack paths from Kerberoastable users to privileged accounts or groups and Uncover lateral movement opportunities before attackers do.
Identify accounts or groups with permissions to replicate domain controller data and prevent potential abuse that could lead to domain-wide compromise.
Detect how standard domain users could escalate privileges and assess privilege escalation risks based on current configurations.
Find paths to systems vulnerable to unconstrained delegation attacks and Address delegation misconfigurations that might lead to credential theft.
Identify how attackers could reach users vulnerable to Kerberoasting, and reveal and remediate weak links in your security chain.
Detect potential attack paths leading to the Domain Admins group and harden your domain by closing escalation paths to critical roles.
